ED526 INTERNET LITERACY FOR EDUCATORS PROJECT 1: RESEARCH PROJECT Bonnie Whisler.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Our Digital World Second Edition
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Recommendations on the future of online GyroScope & Databse implementation.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
An introduction to social networking Marga Navarrete 1 st June 2007.
Internet Phishing Not the kind of Fishing you are used to.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
The Internet Present By Tianyi Xiao ID : C  The Internet is a global system of interconnected computer networks that use the standard Internet.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
The internet is a worldwide public network of computers on which people can join and use multiple services such as sharing of information. OR The Internet,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 The Internet and Its Uses Working at a Small-to-Medium Business or.
Discover the Information Superhighway Explore How It Serves You Test-Drive the Internet.
TC2-Computer Literacy Mr. Sencer February 4, 2010.
P HI SH I NG !. WHAT IS PHISHING ? In computer security phishing is trying to acquire important information such as; passwords, usernames and credit card.
Ashley Chambliss ED 505 Fall 2. “Digital Citizenship is a way for teachers to prepare you for a world full of technology.” (Ribble, ) “A means.
Also called net is a worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
INTERNET- A BOON OR A CURSE AYUSHI PRADHAN. WHAT IS IT? Internet or INTERnational NETwork is a network of networks that crisscrosses the globe and even.
Page 2 What is is an educational network, supported by the European Commission under the Socrates programme Its purpose is to help Comenius.
PHISH OR NO PHISH? Masquerades, Deception, and Thievery On the web…
The Internet By: Sarah T. Bui. What is the internet?  “ an extensive computer network linking thousands of smaller”
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
Digital Citizenship Project By Allen Naylor Ed 505.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
1 Lecture # 21 Evolution of Internet. 2 Circuit switching network This allows the communication circuits to be shared among users. E.g. Telephone exchange.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details.
Phishing: Trends and Countermeasures Blaine Wilson.
INTERNET. Objectives Explain the origin of the Internet and describe how the Internet works. Explain the difference between the World Wide Web and the.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
Technology Social Media Unit 1. What is Social Media? Social media is the interaction among people in which they create, share or exchange information.
A library is primarily set up to acquire, organized, store and make accessible to the users, within the quickest possible time all forms of information.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
October is National CyberSecurity Awareness Month OIT and IT providers across campus are launching an awareness campaign to provide tips and resources.
Unit 12 The Internet.
Computer crimes.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall The Internet: Past and Present.
Strategic Issues: The Internet Pertemuan 21 & 22 Mata kuliah: O INTEGRATED MARKETING COMMUNICATION Tahun: 2009/2010.
ThoughTree Branch out your thoughts
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Malicious Attacks By: Jamie Woznicki Rahul-Anaadi Kurl Alexander Kaufmann Curtis Songer Daniel Cardenas Rivero.
Social Media & Social Networking 101 Canadian Society of Safety Engineering (CSSE)
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Developing sustainable and cost effective compute platforms for NREN PRESENTED BY EJOVI AROR GROUP MD IPNX NIGERIA LIMITED 25 th NOVEMBER 2013.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Internet Security TEAMS March 18 th, ISP:Internet Service Provider.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
REGION IV-A “The NET Endeavor ” By: VW Avelino “Billy” Mendoza Sumagui, DDGM R4A1.
What Links us?. Proposal Please find attached a proposal for Jo Bo jewellery. This proposal is aimed to inform your company about the ways you can use.
Important Information Provided by Information Technology Center
how to prevent them from being successful
Unit 12 The Internet.
E-Learning Yoga Mahesa Prima K
Topic 5: Online Communities Press F5 to view!
Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School
Unit# 5: Internet and Worldwide Web
CYBERSAFETY & Personal information
Phishing “In computing, phishing (also known as carding and spoofing) is a form of social engineering, characterized by attempts to fraudulently acquire.
Presentation transcript:

ED526 INTERNET LITERACY FOR EDUCATORS PROJECT 1: RESEARCH PROJECT Bonnie Whisler

History of the internet What is it? How has it grown? Where is it headed?

Part 1: What is the internet? According to the Internet Society “The Internet is at once a world-wide broadcasting capability, a mechanism for information dissemination, and a medium for collaboration and interaction between individuals and their computers without regard for geographic location.”

How has it grown? According to information from the How Stuff Works website, the internet has been around since It further states that the internet began with just four host computer systems but has grown to tens of millions. It is a hierarchy of networks in that every computer that is connected to the internet is part of a network.

Where is it headed? The Learn the Net website says, “The incubator for many of the emerging technologies shaping the future is known as Internet2.” This is a not a single network, but a consortium of hundreds of high-speed networks linked by fiber optic backbones that span the United States and links to other countries. Internet2

“The network transmits data at speeds up to 2.4 gigabits per second--45,000 times faster than a 56 Kbps modem-- allowing scientists to test their laboratory discoveries in the real world.”network “Internet2's high-speed network, previously reserved for research institutions, is expanding to include additional colleges and K-12 schools. That could mean a national education network connecting thousands of schools around the country. The backbone network, called Abilene, supports high-quality audio and video.”

Potential applications include a digital video archive of best practices for teacher training, videoconferencing that would enable schoolchildren to take a virtual tour of the Smithsonian, and allow for musical collaborations between musicians in different geographic locations.

Sources: What is the internet? How has it grown? Where is it headed?

Part 2: Phishing What is it? Examples of how it is it being used today. How would I use it in my curriculum?

What is it? According to Wikipedia when computing “phising is a criminal activity using social engineering social engineering techniques. Phisers attempt to fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication.” The term is a variant of fishing and alludes to the use of sophisticated lures to “fish” for a user’s password and financial information.

Examples of how it is used today:

In this Pay Pal example spelling mistakes in the and the presence of an IP address in the link are both clues of a phishing attempt. Another clue is the lack of a personal greeting.

Damages caused by phishing range from loss of access to to financial loss to identity theft. Approximately 1.2 million computer users in the United States between May 2004 and May 2005 lost about $929 million due to phishing.

How would I use it in my curriculum? I would not use phising in my curriculum other than to make my students aware of what it is and to use extreme caution when s ask for personal information.

What is phising? All examples. Sources: Picture phishing&gallery=1&page=1

Part 3: Social Networking What is it? What is its impact on society? What is its impact on education?

What is it? Whatis.com defines social networking as the practice of expanding the number of one’s business and/or social contacts by making connections through individuals. Social networking has gone on almost as long as societies themselves existed. The potential of the Internet to promote such connections is only now being fully recognized and exploited through Web- based groups established for that purpose.

Examples: MySpace.com is an example of social networking.

Another example is Google Docs

What is its impact on society? There is a lot of information on social networking and its impact on society. One I found interesting was taken from New Scientist Print Edition. It states that for some people things move from “I have a feeling, I want to call a friend” to “I want to feel something, I need to make a call”. In either case, what is not being cultivated is the ability to be alone and to manage and contain one’s emotions.

What is its impact on education? Social networking impacts education in different ways. The following is only one way. According to eSchool Newsonline, social networking might be a way for schools to increase student access to, and participation in, course activities. Campus-based sites offer a safe space for students to build ties with community members. The university of Pennsylvania offers incoming freshmen membership in “Pennster,” a social-networking site, so they can get to know their classmates before they arrive on campus.

Whatis.com MySpace.com Google Docs New Scientist Print Edition; networking-on-society/ networking-on-society/ eSchoolnews.com Sources: